Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Control applications
biblio
Intrusion-Damage Assessment and Mitigation in Cyber-Physical Systems for Control Applications
Submitted by grigby1 on Mon, 04/03/2017 - 11:52am
composability
Control applications
Cyber Dependencies
Damage Assessment
Intrusion Detection
intrusion mitigation
Metrics
network intrusion detection
Physical layer
physical layer security
physical-layer security
pubcrawl
Resiliency
resource management
Security of cyber-physical systems
biblio
Finite energy and bounded attacks on control system sensor signals
Submitted by BrandonB on Wed, 05/06/2015 - 10:42am
linear quadratic control
Eigenvalues and eigenfunctions
Emerging control theory
enterprise level networks
error signals
Fault-tolerant systems
finite energy
Generators
hardware failures
information security techniques
distributed LQ controllers
linear quadratic Gaussian control
networks security
observer-based controlled systems
power generation network
sensor signal attacks
sensors
software failures
threat surface
Vectors
control system protection
attack free systems
bounded attacks
closed loop systems
closed-loop systems
Computer crime
computer network reliability
computer network security
Control applications
control system networks
actuator signal attacks
control system reliability
control system sensor signals
Cost function
cost functions maximization
CPS protecting
critical industrial controls systems
cyber-attacks
cyber-physical systems protection
biblio
Finite energy and bounded attacks on control system sensor signals
Submitted by BrandonB on Thu, 04/30/2015 - 11:54am
linear quadratic control
Eigenvalues and eigenfunctions
Emerging control theory
enterprise level networks
error signals
Fault-tolerant systems
finite energy
Generators
hardware failures
information security techniques
distributed LQ controllers
linear quadratic Gaussian control
networks security
observer-based controlled systems
power generation network
sensor signal attacks
sensors
software failures
threat surface
Vectors
control system protection
attack free systems
bounded attacks
closed loop systems
closed-loop systems
Computer crime
computer network reliability
computer network security
Control applications
control system networks
actuator signal attacks
control system reliability
control system sensor signals
Cost function
cost functions maximization
CPS protecting
critical industrial controls systems
cyber-attacks
cyber-physical systems protection